Useful Commands, Reverse Shell, Privilege Escalation Methods, Impersonation Attacks, Useful Powershell Commands and more
☆125Apr 17, 2020Updated 5 years ago
Alternatives and similar repositories for Windows
Users that are interested in Windows are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- I've described several Network Tunneling methods in this repository. Hope you enjoy it! #maytheforcebewithyou☆32Aug 27, 2019Updated 6 years ago
- ☆145Jan 8, 2020Updated 6 years ago
- OSCP☆577Feb 6, 2022Updated 4 years ago
- High-precision, real-time people locator via a link☆18Nov 28, 2023Updated 2 years ago
- OSCP Prep notes☆14Oct 18, 2020Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Scripts I used during CTP☆68Jul 11, 2020Updated 5 years ago
- buffer overflow examples☆23Dec 20, 2017Updated 8 years ago
- Transform your batch (bat) script into one binary.exe☆53Feb 11, 2024Updated 2 years ago
- This contains common OSCP local exploits and enumeration scripts☆12Sep 18, 2015Updated 10 years ago
- CVE-2020-10204 远程命令执行脚本☆13May 27, 2020Updated 5 years ago
- Network Pivoting Toolkit☆458Aug 26, 2023Updated 2 years ago
- ☆12Apr 21, 2019Updated 6 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 8 years ago
- Scan for and exploit Consul agents☆39Jun 11, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A Powershell Privilege Escalation Enumeration Script.☆315Mar 14, 2018Updated 8 years ago
- Windows post-exploitation tools, resources, techniques and commands to use during post-exploitation phase of penetration test. Contribut…☆545Sep 7, 2025Updated 6 months ago
- Custom stagers with python encrypting proxy☆40May 25, 2015Updated 10 years ago
- ☆24Dec 9, 2020Updated 5 years ago
- PowerShell Asynchronous TCP Reverse Shell☆158Nov 27, 2025Updated 3 months ago
- psgen is a powershell payload generator tool for hacking. It can be used to generate, minify, and encode the powershell payload (e.g., re…☆18Jun 30, 2020Updated 5 years ago
- Bash script to generate reverse shell payloads☆19Sep 9, 2023Updated 2 years ago
- FETB : Take URL of File For Analysis using File + ExifTool + Binwalk Commands☆20Feb 2, 2021Updated 5 years ago
- Search Tinder Users With Filters☆15Jul 26, 2025Updated 8 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Compiled Binaries for Sharp Suite☆15Dec 28, 2019Updated 6 years ago
- About Us☆19Mar 30, 2024Updated last year
- Mass exploitation of CVE-2021-24499 unauthenticated upload leading to remote code execution in Workreap theme.☆16Sep 20, 2021Updated 4 years ago
- Batch file to help automate Windows enumeration for privilege escalation☆91Sep 25, 2016Updated 9 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆65May 31, 2020Updated 5 years ago
- A simple program to query nmap xml files in the terminal.☆27May 4, 2020Updated 5 years ago
- A curated list of awesome Windows Exploitation resources, and shiny things. Inspired by awesom☆77Jan 30, 2020Updated 6 years ago
- Windows / Linux Local Privilege Escalation Workshop☆1,004Jan 15, 2019Updated 7 years ago
- devops scripts☆33Dec 8, 2016Updated 9 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Powershell script to automate finding privilege escalation vectors in windows environments.☆16Nov 30, 2019Updated 6 years ago
- Windows DLL Loading Utility☆12Jun 11, 2020Updated 5 years ago
- Website vuln example.☆11Sep 26, 2025Updated 6 months ago
- Becoming the spider, crawling through the webs to catch the fly.☆84Jun 25, 2021Updated 4 years ago
- A powerful pentesting tool for proactive detection and exploitation of dependency confusion vulnerabilities in Node.js projects. Enhance …☆14Jul 25, 2023Updated 2 years ago
- RedPeanut is a small RAT developed in .Net Core 2 and its agent in .Net 3.5 / 4.0.☆330Jul 7, 2023Updated 2 years ago
- Escalation of privilege exploit for Dell BIOS flasher (Flash64W) (2017)☆13Dec 7, 2020Updated 5 years ago